In the online world, increasing amounts of personal data of users are processed by service providers and other third party data processors. The privacy principle of transparency means that users should be informed about what data about them are processed by whom and how. This report describes a log service that enables users to reconstruct a log trail of these actions, by retrieving log entries from log servers. The information that links log entries into a trail is logged — together with the encrypted action data — to dedicated log servers by the data processors. In the proposed service, log entries of one trail can be spread over different log servers, possibly generated by different data processors. The fact that certain information is l...
Abstract — Cloud computing is delivery of services rather than a product and among different cloud d...
Nowadays we are faced with an increasing popularity of social software including wikis, blogs, micro...
While logging events is becoming increasingly common in computing, in communication and in collabora...
In the online world, increasing amounts of personal data of users are processed by service providers...
In this paper we present a scheme for building a logging-trail for processes related to eGovernment ...
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They ...
© Springer International Publishing Switzerland 2016. Service providers collect and process more use...
On the Internet today, users are accustomed to disclosing personal information when accessing a new ...
Abstract—We consider the scenario where a consumer can securely outsource their network telemetry da...
Logs are one of the most fundamental resources to any security professional. It is widely recognized...
The 2019 7th International Conference in Software Engineering Research and Innovation (CONISOFT), Me...
As security monitoring grows both more complicated and more sophisticated, there is an increased de...
We consider the problem of privacy-preserving processing of outsourced data in the context of user-c...
The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for tr...
In this paper, we propose a confidential logging and auditing service for distributed information sy...
Abstract — Cloud computing is delivery of services rather than a product and among different cloud d...
Nowadays we are faced with an increasing popularity of social software including wikis, blogs, micro...
While logging events is becoming increasingly common in computing, in communication and in collabora...
In the online world, increasing amounts of personal data of users are processed by service providers...
In this paper we present a scheme for building a logging-trail for processes related to eGovernment ...
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They ...
© Springer International Publishing Switzerland 2016. Service providers collect and process more use...
On the Internet today, users are accustomed to disclosing personal information when accessing a new ...
Abstract—We consider the scenario where a consumer can securely outsource their network telemetry da...
Logs are one of the most fundamental resources to any security professional. It is widely recognized...
The 2019 7th International Conference in Software Engineering Research and Innovation (CONISOFT), Me...
As security monitoring grows both more complicated and more sophisticated, there is an increased de...
We consider the problem of privacy-preserving processing of outsourced data in the context of user-c...
The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for tr...
In this paper, we propose a confidential logging and auditing service for distributed information sy...
Abstract — Cloud computing is delivery of services rather than a product and among different cloud d...
Nowadays we are faced with an increasing popularity of social software including wikis, blogs, micro...
While logging events is becoming increasingly common in computing, in communication and in collabora...